Breaking Bad-Themed Ransomware Takes Hold Down Under

CyberCrimeSecurity
breaking bad
1 4 1 Comment

Los Pollos Hermanos-branded malware tricking users in handing over hundreds of dollars

Fans of Breaking Bad may be doing a bit of a double-take at their computer screens today following the discovery of new ransomware themed around the TV show, which deals deals with the criminal exploits of high school chemistry teacher-turned-meth kingpin Walter White.

Researchers at security firm Symantec say the malware is currently affecting computers across Australia, encrypting images, videos, documents, and more on the compromised computer and demands up to AU$1,000 ((£510 / $791) to decrypt these files.

breaking bad ransomwareHeisenberg

Affected users are confronted with a message (pictured left) sporting the branding of Los Pollos Hermanos, a fictional fried chicken shop featured in Breaking Bad.

The demand also features an responding email address containing one of the show’s most iconic lines, “I am the one who knocks”.

Victims are then directed to a website teaching them how to obtain Bitcoin, which is the hackers’ preferred method of payment.

The threat also opens another YouTube video in the background. This video is a song used in a fictional radio station in the game Grand Theft Auto V, which some fans believe is a shout-out to Breaking Bad.

Symantec suggests many users are tricked into downloading the malware, which is formed of the latest iteration of the notorious Trojan.Cryptolocker.S, via social engineering. T

he first point of infection is a zip archive containing the malicious VBC.Downloader.Trojan, entitled – in this case – PENALTY.VBS. The file decompresses to a non-malicious PDF in order to convince the victim that the unzipping operation was harmless, whereas it has actually unleashed the crypto ransomware upon the unwilling victim.

This particular ransomware set-up appears to have derived techniques which use elements of an open-source, white-hat penetration-testing project employing Microsoft PowerShell modules. The attack runs a PowerShell script to complete the encryption process, which employs the use of an Advanced Encryption Standard (AES) key encrypted with an RSA public key. This means that the victim can only unlock their files with a key provided by the cyber-extortionists.

Ransomware has proven to be an increasingly unwelcome presence in the cybersecurity industry in recent years. Research released last week by Kaspersky revealed that mobile ransomware had grown 65 percent year on year, with mobile browsers also recorded as accounting for 64 percent of mobile exploits, showing that users need to remain on their guard at all times.

Are you a security expert? Try our quiz!


Click to read the authors bio  Click to hide the authors bio